Total Secured Endpoints
Estimated number of endpoints secured with Trusted Computing technology to date.
RSA Conference 2015: TCG Association Seminar
RSA Conference 2015 is now open for registration. Don't miss this opportunity to join thousands of industry professionals at the premier information security event of 2015!
Fear and Loathing in BYOD
SANS Analyst Survey focused on understanding mobile device security trends and to identify the techniques organizations are adopting to mitigate threats associated with mobile devices and BYOD.
Protect Your Data and Enhance Security with Trusted Platform Modules (TPM)
View the latest infographic that shows the many benefits and problems solved when implementing the Trusted Platform Module (TPM)
Where Trust Begins Infographic
Latest TCG infographic on protecting the connected ecosystem.
To enhance your experience, please download the free Adobe Flash Player
TCG Announces RSA Conference 2015 Session with Speakers and Panelists from CyberUnited, GlobalPlatform, Lawrence Livermore National Laboratory, Open Systems Media, Security Ledger, University of Washington, and More
Apress and Trusted Computing Group with Members IBM, Intel Corporation and Johns Hopkins University Release New Book, “A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security”